@inproceedings{Ferrein2015, author = {Ferrein, Alexander}, title = {3D-Mapping von Straßentunneln}, series = {16. Geokinematischer Tag, 07. und 08. Mai 2015 : Tagungsband / Technische Universit{\"a}t Bergakademie Freiberg}, booktitle = {16. Geokinematischer Tag, 07. und 08. Mai 2015 : Tagungsband / Technische Universit{\"a}t Bergakademie Freiberg}, pages = {31 -- 40}, year = {2015}, language = {de} } @inproceedings{Ferrein2015, author = {Ferrein, Alexander}, title = {Robots: challenges, chances and risks for solving 21st century problems}, series = {President's Invitation Lecture / South African Institute of Electrical Engineers : May 21 \& 22, 2015, University of Johannesburg}, booktitle = {President's Invitation Lecture / South African Institute of Electrical Engineers : May 21 \& 22, 2015, University of Johannesburg}, organization = {South African Institute of Electrical Engineers}, pages = {1 -- 45}, year = {2015}, language = {en} } @inproceedings{HeuermannSadeghfam2015, author = {Heuermann, Holger and Sadeghfam, Arash}, title = {Universaler Plasmajet f{\"u}r verschiedene Behandlungsschritte der Klebetechnik}, series = {Tagungsband / 15. Kolloquium Gemeinsame Forschung in der Klebtechnik : 3. und 4. M{\"a}rz 2015, Maternushaus, K{\"o}ln / DECHEMA}, booktitle = {Tagungsband / 15. Kolloquium Gemeinsame Forschung in der Klebtechnik : 3. und 4. M{\"a}rz 2015, Maternushaus, K{\"o}ln / DECHEMA}, address = {K{\"o}ln}, pages = {85 -- 87}, year = {2015}, language = {de} } @inproceedings{BischofEyKucketal.2015, author = {Bischof, Michael and Ey, Ludger and Kuck, Alexander and Rahier, Michael and Ritz, Thomas}, title = {Nutzerzentrierte Gestaltung und Entwicklung eines kontextsensitiven HMI}, series = {Mensch und Computer 2015 : Workshop}, booktitle = {Mensch und Computer 2015 : Workshop}, editor = {Weisbecker, Anette}, publisher = {De Gruyter Oldenbourg}, address = {Berlin}, isbn = {978-3-11-044333-2}, pages = {467 -- 474}, year = {2015}, language = {de} } @inproceedings{Huening2016, author = {H{\"u}ning, Felix}, title = {Power Semiconductors for the automotive 48V board net}, series = {PCIM Europe 2016 Conference Proceedings}, booktitle = {PCIM Europe 2016 Conference Proceedings}, publisher = {VDE Verl.}, address = {Berlin}, isbn = {978-3-8007-4186-1}, pages = {1963 -- 1969}, year = {2016}, language = {en} } @inproceedings{HarzheimHeuermannMarso2016, author = {Harzheim, Thomas and Heuermann, Holger and Marso, Michel}, title = {An Adaptive Biasing Method for SRD Comb Generators}, series = {2016 German Microwave Conference (GeMiC)}, booktitle = {2016 German Microwave Conference (GeMiC)}, publisher = {IEEE}, doi = {10.1109/GEMIC.2016.7461613}, pages = {289 -- 292}, year = {2016}, language = {en} } @inproceedings{NiemuellerReuterFerrein2016, author = {Niemueller, Tim and Reuter, Sebastian and Ferrein, Alexander}, title = {Fawkes for the RoboCup Logistics League}, series = {RoboCup 2015: Robot World Cup XIX}, booktitle = {RoboCup 2015: Robot World Cup XIX}, editor = {Almeida, Luis}, publisher = {Springer International Publishing}, address = {Cham}, isbn = {978-3-319-29339-4}, doi = {10.1007/978-3-319-29339-4_31}, pages = {365 -- 373}, year = {2016}, language = {en} } @inproceedings{BroennerHoefkenSchuba2016, author = {Broenner, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Streamlining extraction and analysis of android RAM images}, series = {Proceedings of the 2nd international conference on information systems security and privacy}, booktitle = {Proceedings of the 2nd international conference on information systems security and privacy}, organization = {ICISSP International Conference on Information Systems Security and Privacy <2, 2016, Rome, Italy>}, isbn = {978-989-758-167-0}, doi = {10.5220/0005652802550264}, pages = {255 -- 264}, year = {2016}, language = {en} } @inproceedings{RauschLeiseEdereretal.2016, author = {Rausch, Lea and Leise, Philipp and Ederer, Thorsten and Altherr, Lena and Pelz, Peter F.}, title = {A comparison of MILP and MINLP solver performance on the example of a drinking water supply system design problem}, series = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, booktitle = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, editor = {Papadrakakis, M. and Ppadopoulos, V. and Stefanou, G. and Plevris, V.}, isbn = {978-618-82844-0-1}, pages = {8509 -- 8527}, year = {2016}, abstract = {Finding a good system topology with more than a handful of components is a highly non-trivial task. The system needs to be able to fulfil all expected load cases, but at the same time the components should interact in an energy-efficient way. An example for a system design problem is the layout of the drinking water supply of a residential building. It may be reasonable to choose a design of spatially distributed pumps which are connected by pipes in at least two dimensions. This leads to a large variety of possible system topologies. To solve such problems in a reasonable time frame, the nonlinear technical characteristics must be modelled as simple as possible, while still achieving a sufficiently good representation of reality. The aim of this paper is to compare the speed and reliability of a selection of leading mathematical programming solvers on a set of varying model formulations. This gives us empirical evidence on what combinations of model formulations and solver packages are the means of choice with the current state of the art.}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} }